{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,19]],"date-time":"2026-05-19T13:25:10Z","timestamp":1779197110228,"version":"3.51.4"},"reference-count":34,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2025,1,7]],"date-time":"2025-01-07T00:00:00Z","timestamp":1736208000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,7]],"date-time":"2025-01-07T00:00:00Z","timestamp":1736208000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["Nos.72471206,71972165,61763048,72164037"],"award-info":[{"award-number":["Nos.72471206,71972165,61763048,72164037"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Central Government's Special Program for Guiding Local Science and Technology Development","award":["No.202307AB110009"],"award-info":[{"award-number":["No.202307AB110009"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Supercomput"],"DOI":"10.1007\/s11227-024-06844-w","type":"journal-article","created":{"date-parts":[[2025,1,7]],"date-time":"2025-01-07T03:09:02Z","timestamp":1736219342000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["A fair multi-party contract signing scheme based on off-chain protocols and on-chain smart contracts"],"prefix":"10.1007","volume":"81","author":[{"given":"Rong","family":"Jiang","sequence":"first","affiliation":[]},{"given":"Yulin","family":"Li","sequence":"additional","affiliation":[]},{"given":"Xuetao","family":"Pu","sequence":"additional","affiliation":[]},{"given":"Xueke","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Wenyu","family":"Niu","sequence":"additional","affiliation":[]},{"given":"Zhiming","family":"Song","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,1,7]]},"reference":[{"key":"6844_CR1","doi-asserted-by":"publisher","unstructured":"Quoc K.L, Vo H.K, Huong L.H, Gia K.H, Dang K.T, Van H.L, Huu N.H, Huyen T.N, Nguyen T.A, Van Cao\u00a0Phu L, et al (2022). Sssb: an approach to insurance for cross-border exchange by using smart contracts. In: International Conference on Mobile Web and Intelligent Information Systems, 179\u2013192 . https:\/\/doi.org\/10.1007\/978-3-031-14391-5_14. Springer","DOI":"10.1007\/978-3-031-14391-5_14"},{"issue":"17","key":"6844_CR2","doi-asserted-by":"publisher","first-page":"1606","DOI":"10.1016\/S0140-3664(02)00049-X","volume":"25","author":"S Kremer","year":"2002","unstructured":"Kremer S, Markowitch O, Zhou J (2002) An intensive survey of fair non-repudiation protocols. Computer Commun 25(17):1606\u20131621. https:\/\/doi.org\/10.1016\/S0140-3664(02)00049-X","journal-title":"Computer Commun"},{"key":"6844_CR3","doi-asserted-by":"publisher","unstructured":"Wang G, Yu Y, Song Z, Fu T (2023). Fair contract signing model based on blockchain and ves algorithm. In: 2023 5th International Conference on Communications, Information System and Computer Engineering (CISCE), 476\u2013480 . https:\/\/doi.org\/10.1109\/CISCE58541.2023.10142628 . IEEE","DOI":"10.1109\/CISCE58541.2023.10142628"},{"key":"6844_CR4","doi-asserted-by":"publisher","unstructured":"Gilcrest J, Carvalho A (2018). Smart contracts: legal considerations. In: 2018 IEEE International Conference on Big Data (Big Data), 3277\u20133281 . https:\/\/doi.org\/10.1109\/BigData.2018.8622584 . IEEE","DOI":"10.1109\/BigData.2018.8622584"},{"key":"6844_CR5","doi-asserted-by":"publisher","first-page":"45360","DOI":"10.1109\/ACCESS.2019.2902501","volume":"7","author":"J Abou Jaoude","year":"2019","unstructured":"Abou Jaoude J, Saade RG (2019) Blockchain applications-usage in different domains. IEEE Access 7:45360\u201345381","journal-title":"IEEE Access"},{"issue":"9","key":"6844_CR6","doi-asserted-by":"publisher","first-page":"0310407","DOI":"10.1371\/journal.pone.0310407","volume":"19","author":"BM Yakubu","year":"2024","unstructured":"Yakubu BM, Ali SM, Khan MI, Bhattarakosol P (2024) Patcen: a blockchain-based patient-centric mechanism for the granular access control of infectious disease-related test records. Plos one 19(9):0310407","journal-title":"Plos one"},{"issue":"1","key":"6844_CR7","doi-asserted-by":"publisher","first-page":"17108","DOI":"10.1038\/s41598-023-44101-x","volume":"13","author":"BM Yakubu","year":"2023","unstructured":"Yakubu BM, Sabi\u2019u J, Bhattarakosol P (2023) Blockchain-based privacy and security model for transactional data in large private networks. Sci Rep 13(1):17108","journal-title":"Sci Rep"},{"key":"6844_CR8","unstructured":"Gao Y, Wu J (2018) Efficient multi-party fair contract signing protocol based on blockchains. J Cryptol Res 5(5):556\u2013567"},{"issue":"1","key":"6844_CR9","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1090\/conm\/324\/05731","volume":"324","author":"D Boneh","year":"2003","unstructured":"Boneh D, Silverberg A (2003) Applications of multilinear forms to cryptography. Contemp Math 324(1):71\u201390","journal-title":"Contemp Math"},{"key":"6844_CR10","doi-asserted-by":"publisher","unstructured":"Boneh D, Gentry C, Lynn B, Shacham H (2003). Aggregate and verifiably encrypted signatures from bilinear maps. In: Advances in Cryptology-EUROCRYPT 2003: International Conference on the Theory and Applications of Cryptographic Techniques, Warsaw, Poland, May 4\u20138, 2003 Proceedings 22, 416\u2013432 . https:\/\/doi.org\/10.1007\/3-540-39200-9_26. Springer","DOI":"10.1007\/3-540-39200-9_26"},{"key":"6844_CR11","doi-asserted-by":"publisher","unstructured":"Boneh D, Lynn B, Shacham H (2001). Short signatures from the weil pairing. In: International Conference on the Theory and Application of Cryptology and Information Security, 514\u2013532 . https:\/\/doi.org\/10.1007\/3-540-45682-1_30. Springer","DOI":"10.1007\/3-540-45682-1_30"},{"key":"6844_CR12","doi-asserted-by":"publisher","unstructured":"Das S, Ren L (2024). Adaptively secure bls threshold signatures from ddh and co-cdh. In: Annual International Cryptology Conference, 251\u2013284. https:\/\/doi.org\/10.1007\/978-3-031-68394-7_9. Springer","DOI":"10.1007\/978-3-031-68394-7_9"},{"key":"6844_CR13","unstructured":"Baldimtsi F, Chalkias K.K, Garillot F, Lindstrom J, Riva B, Roy A, Sedaghat M, Sonnino A, Waiwitlikhit P, Wang J (2023) Subset-optimized bls multi-signature with key aggregation. Cryptology ePrint Archive"},{"issue":"2","key":"6844_CR14","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"RL Rivest","year":"1978","unstructured":"Rivest RL, Shamir A, Adleman L (1978) A method for obtaining digital signatures and public-key cryptosystems. Commun ACM 21(2):120\u2013126. https:\/\/doi.org\/10.1145\/359340.359342","journal-title":"Commun ACM"},{"issue":"15","key":"6844_CR15","doi-asserted-by":"publisher","first-page":"1002","DOI":"10.1049\/el:19890670","volume":"25","author":"L Harn","year":"1989","unstructured":"Harn L, Kiesler T (1989) New scheme for digital multisignatures. Electron Lett 25(15):1002\u20131003. https:\/\/doi.org\/10.1049\/el:19890670","journal-title":"Electron Lett"},{"key":"6844_CR16","doi-asserted-by":"publisher","unstructured":"Tsai J-L, Lo N-W, Wu T-C (2013) New identity-based sequential aggregate signature scheme from rsa. In: 2013 International Symposium on Biometrics and Security Technologies, pp 136\u2013140. https:\/\/doi.org\/10.1109\/ISBAST.2013.25. IEEE","DOI":"10.1109\/ISBAST.2013.25"},{"issue":"9","key":"6844_CR17","doi-asserted-by":"publisher","first-page":"2139","DOI":"10.1007\/s10623-019-00608-x","volume":"87","author":"G Maxwell","year":"2019","unstructured":"Maxwell G, Poelstra A, Seurin Y, Wuille P (2019) Simple schnorr multi-signatures with applications to bitcoin. Designs Codes Cryptogr 87(9):2139\u20132164. https:\/\/doi.org\/10.1007\/s10623-019-00608-x","journal-title":"Designs Codes Cryptogr"},{"key":"6844_CR18","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1007\/BF00196725","volume":"4","author":"C-P Schnorr","year":"1991","unstructured":"Schnorr C-P (1991) Efficient signature generation by smart cards. J Cryptol 4:161\u2013174. https:\/\/doi.org\/10.1007\/BF00196725","journal-title":"J Cryptol"},{"key":"6844_CR19","unstructured":"Szabo N (1996). Smart contracts: building blocks for digital markets. EXTROPY: J Transhumanist Thought (16) 18(2):28"},{"issue":"1","key":"6844_CR20","doi-asserted-by":"publisher","first-page":"241","DOI":"10.1109\/TSC.2019.2937486","volume":"15","author":"C Tian","year":"2019","unstructured":"Tian C, Yu J, Zhang H, Xue H, Wang C, Ren K (2019) Novel secure outsourcing of modular inversion for arbitrary and variable modulus. IEEE Trans Services Comput 15(1):241\u2013253. https:\/\/doi.org\/10.1109\/TSC.2019.2937486","journal-title":"IEEE Trans Services Comput"},{"key":"6844_CR21","doi-asserted-by":"publisher","DOI":"10.1016\/j.elerap.2019.100869","volume":"36","author":"J-L Ferrer-Gomila","year":"2019","unstructured":"Ferrer-Gomila J-L, Hinarejos MF, Isern-Deya A-P (2019) A fair contract signing protocol with blockchain support. Electron Commerce Res Appl 36:100869. https:\/\/doi.org\/10.1016\/j.elerap.2019.100869","journal-title":"Electron Commerce Res Appl"},{"issue":"22","key":"6844_CR22","doi-asserted-by":"publisher","first-page":"4469","DOI":"10.1002\/cpe.4469","volume":"31","author":"H Huang","year":"2019","unstructured":"Huang H, Li K-C, Chen X (2019) Blockchain-based fair three-party contract signing protocol for fog computing. Concurr Comput: Pract Exp 31(22):4469. https:\/\/doi.org\/10.1002\/cpe.4469","journal-title":"Concurr Comput: Pract Exp"},{"key":"6844_CR23","doi-asserted-by":"publisher","first-page":"142","DOI":"10.1016\/j.ins.2020.05.054","volume":"535","author":"L Zhang","year":"2020","unstructured":"Zhang L, Zhang H, Yu J, Xian H (2020) Blockchain-based two-party fair contract signing scheme. Inf Sci 535:142\u2013155. https:\/\/doi.org\/10.1016\/j.ins.2020.05.054","journal-title":"Inf Sci"},{"key":"6844_CR24","doi-asserted-by":"publisher","unstructured":"Hinarejos MF, Ferrer-Gomila J-L, Isern-Dey\u00e0 A-P (2023) Enforcing fairness with blockchain support: proposals for multi-two-party contract signing. IEEE Access. https:\/\/doi.org\/10.1109\/ACCESS.2023.3292160","DOI":"10.1109\/ACCESS.2023.3292160"},{"issue":"4","key":"6844_CR25","doi-asserted-by":"publisher","first-page":"4710","DOI":"10.1002\/ett.4710","volume":"35","author":"T Zhang","year":"2024","unstructured":"Zhang T, Wang Y, Ding Y, Jiang X, Liang H, Wang H (2024) Privacy-preserving blockchain-based contract signing with multi-party supervision. Trans Emerg Telecommun Technol 35(4):4710. https:\/\/doi.org\/10.1002\/ett.4710","journal-title":"Trans Emerg Telecommun Technol"},{"issue":"12","key":"6844_CR26","doi-asserted-by":"publisher","first-page":"1457","DOI":"10.3390\/electronics10121457","volume":"10","author":"J-L Ferrer-Gomila","year":"2021","unstructured":"Ferrer-Gomila J-L, Hinarejos MF (2021) A multi-party contract signing solution based on blockchain. Electronics 10(12):1457. https:\/\/doi.org\/10.3390\/electronics10121457","journal-title":"Electronics"},{"key":"6844_CR27","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2023.120054","volume":"658","author":"R Jiang","year":"2024","unstructured":"Jiang R, Liu R, Zhang T, Ding W, Tian S (2024) An electronic medical record access control model based on intuitionistic fuzzy trust. Inf Sci 658:120054. https:\/\/doi.org\/10.1016\/j.ins.2023.120054","journal-title":"Inf Sci"},{"issue":"1","key":"6844_CR28","doi-asserted-by":"publisher","first-page":"104","DOI":"10.1186\/s40537-023-00783-8","volume":"10","author":"R Jiang","year":"2023","unstructured":"Jiang R, Chen X, Yu Y, Zhang Y, Ding W (2023) Risk and ucon-based access control model for healthcare big data. J Big Data 10(1):104. https:\/\/doi.org\/10.1186\/s40537-023-00783-8","journal-title":"J Big Data"},{"key":"6844_CR29","doi-asserted-by":"publisher","unstructured":"Daemen J, Rijmen V (2002) The design of Rijndael vol. 2. Springer, Berlin. https:\/\/doi.org\/10.1007\/978-3-662-60769-5","DOI":"10.1007\/978-3-662-60769-5"},{"key":"6844_CR30","doi-asserted-by":"publisher","unstructured":"Pointcheval D, Stern J (1996). Security proofs for signature schemes. In: International Conference on the Theory and Applications of Cryptographic Techniques, 387\u2013398. https:\/\/doi.org\/10.1007\/3-540-68339-9_33. Springer","DOI":"10.1007\/3-540-68339-9_33"},{"key":"6844_CR31","doi-asserted-by":"publisher","first-page":"361","DOI":"10.1007\/s001450010003","volume":"13","author":"D Pointcheval","year":"2000","unstructured":"Pointcheval D, Stern J (2000) Security arguments for digital signatures and blind signatures. J Cryptol 13:361\u2013396. https:\/\/doi.org\/10.1007\/s001450010003","journal-title":"J Cryptol"},{"key":"6844_CR32","doi-asserted-by":"publisher","unstructured":"Boneh D, Drijvers M, Neven G (2018). Compact multi-signatures for smaller blockchains. In: International Conference on the Theory and Application of Cryptology and Information Security, 435\u2013464. https:\/\/doi.org\/10.1007\/978-3-030-03329-3_15. Springer","DOI":"10.1007\/978-3-030-03329-3_15"},{"key":"6844_CR33","doi-asserted-by":"publisher","unstructured":"Drijvers M, Edalatnejad K, Ford B, Kiltz E, Loss J, Neven G, Stepanovs I (2019). On the security of two-round multi-signatures. In: 2019 IEEE Symposium on Security and Privacy (SP), pp 1084\u20131101. https:\/\/doi.org\/10.1109\/SP.2019.00050. IEEE","DOI":"10.1109\/SP.2019.00050"},{"issue":"8","key":"6844_CR34","doi-asserted-by":"publisher","first-page":"0273424","DOI":"10.1371\/journal.pone.0273424","volume":"17","author":"W Xiong","year":"2022","unstructured":"Xiong W, Hu Y (2022) Delegate contract signing mechanism based on smart contract. Plos one 17(8):0273424","journal-title":"Plos one"}],"container-title":["The Journal of Supercomputing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-024-06844-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11227-024-06844-w\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-024-06844-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,7]],"date-time":"2025-01-07T05:08:23Z","timestamp":1736226503000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11227-024-06844-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,1,7]]},"references-count":34,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2025,1]]}},"alternative-id":["6844"],"URL":"https:\/\/doi.org\/10.1007\/s11227-024-06844-w","relation":{},"ISSN":["1573-0484"],"issn-type":[{"value":"1573-0484","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,1,7]]},"assertion":[{"value":"17 December 2024","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 January 2025","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval"}}],"article-number":"372"}}